‘Sometimes you just have to try something’ - A critical analysis of Danish state-led initiatives countering online radicalisation

Authors

  • Anna Warrington University of Copenhagen,

Keywords:

Online Radicalisation, Countering Violent Extremism, CVE, Terrorism, Critical Terrorism Studies

Abstract

This research paper argues that Danish online radicalisation policies are driven by logics of urgency (the threat is imminent) within a limited realm of discursive possibilities (the threat is securitised) which blur the lines between state and civil society as well as state and private sector interactions. Potential political implications bring into play questions about the democratic values that are perceived as safeguarded by these policies. The Danish case shows that we (as citizens, policy makers and researchers) must engage in further discussions on dynamics between the current threat perception of online radicalisation and policies addressing such a threat. My argument is constructed from a discourse analysis of official documents as of 2016-2017 on countering and preventing violent extremism and an analysis of the political logics driving a state-level conceptualisation of online radicalisation through interviews with government officials. The two-part analysis is theoretically based on Securitisation from the Copenhagen School in combination with Critical Terrorism Studies to create a critically inspired approach that remains within existing structures of Danish politics. This is done to engage with the current political landscape characterised by a securitisation of specific forms of online content associated with the Islamic State as an Other. Online radicalisation is herein constructed as a multidimensional threat towards a societal Self referring to the physical safety of citizens and a value based ‘way of life’. The decentralised structure of the internet allows communication flows that enable radicalisation to be understood as an inter-sectoral threat where multiple elements of the referent object are threatened simultaneously. This threat perception challenges government officials in developing and implementing policies to address the threat of the Other while safeguarding the democratic values of the Danish Self.

Author Biography

Anna Warrington, University of Copenhagen,

Academic Coordination Officer, Corresponding Author Contact: Anna Warrington, Email: anna-warrington@hotmail.com University of Copenhagen Faculty of Social Sciences, Øster Farimagsgade 5, 1353 Copenhagen K. LinkedIn: https://www.linkedin.com/in/anna-warrington/ 

References

Aistrope, T. (2016b) The Muslim paranoia narrative in counter-radicalisation policy. Critical Studies on Terrorism, 9:2. p. 182-204

Aradau, C. and T. Blanke (2016) Politics of prediction: Security and the time/space of governmentality in the age of big data. European Journal of Social Theory. p. 1-19

Ashour, O. (2011). Online De-Radicalization? Countering Violent Extremist Narratives: Message, Messenger and Media Strategy. Perspectives on Terrorism, 4(6). p. 15-19

Balzacq T., Guzzini S., Williams M. C., Wæver, O., and Patomäki, H. Forum: What kind of theory—if any—is securitization? p. 26-32

Bertelsen, P. (2015) “Danish Preventive Measures and De-radicalisation Strategies: The Aarhus Model” in Hofmeister, W. and M. Sarmah (editors). From the desert to world cities: The new terrorism. Panorama: Insights into Asian and European Affairs. Konrad-Adenauer-Stiftung Ltd. p. 241- 252

Blaikie, N. (2000) “Strategies for answering research questions” in Designing Social Research – The Logic for Anticipation, Polity Press, Cambridge. p. 85-119

Blakeley R. (2010) ‘State terrorism in the social sciences: theories, methods and concepts’ in Jackson, R., E. Murphy and S. Poyting, Contemporary State Terrorism - Theory and Practice. Routledge. p. 12-28

Bryman, A. and G. Burgess (2002) “Developments in qualitative data analysis” in Analyzing Qualitative Data, Routledge. p. 1-18

Buzan, B., O. Wæver and J. de Wilde (1998) Security: A New Framework for Analysis. Boulder, CO: Lynne Rienner Publishers, p. 1-239

Byman, D. (2016) Understanding the Islamic State - A review essay. International Security, Volume 40, Number 4. p. 127-165

Christmann, K. (2012). Preventing Religious Radicalization and Violent Extremism. A Systematic Review of the Research Evidence. Youth Justice Board. p. 1-77

Collins, J. and R. Glover (2002) “Terrorism” in Collins, John and Ross Glover Collateral Language: A User’s Guide to America’s New War, New York University Press, p. 155-173

Crone, M. (2016). Radicalization revisited: violence, politics and the skills of the body. International Affairs, 92(3). p. 587–604

Dalgaard-Nielsen, A. (2010) Violent Radicalization in Europe: What We Know and What We Do Not Know, Studies in Conflict & Terrorism, 33:9, p. 797-814

Dalgaard-Nielsen, A. (2013) Promoting Exit from Violent Extremism: Themes and Approaches, Studies in Conflict & Terrorism, 36:2, p. 99-115

Dalgaard-Nielsen, A. (2016) Countering Violent Extremism with Governance Networks. Perspectives on Terrorism. Vol 10. Issue 6. p. 135-139

Davies, G., Neudecker, C., Ouellet, M., Bouchard, M., & Ducol, B. (2016). Toward a Framework Understanding of Online Programs for Countering Violent Extremism. JD Journal for De-radicalization, 6(Spring 2016). p. 51-86

Ditrych, O. (2014) “Concerning Method” and “Enclosure 2000s” In Tracing the Discourses of Terrorism: Identity, Genealogy and State. Springer. p. 76-94

Eroukhmanoff, C. (2015) “The remote securitization of Islam in the US post-9/11: euphemisation, metaphors and the “logic of expected consequences” in counter-radicalization discourse. Critical Studies on Terrorism, 8:2. p. 246-265

Friis, S. M. (2015) Beyond anything we have ever: beheading videos and the visibility of violence in the war against ISIS. International Affairs vol. 91, no. 4, p. 725-746

Geeraerts, S. B. (2012) Digital Radicalization of Youth, Social Cosmos 3(1) 2012, p: 25–32

Gibbs, Graham R. (2007) Analyzing Qualitative Data, Sage Research Methods. p. 38-49; 143-150

Greenberg, K.J. (2016) Counter-radicalisation via the internet. The ANNALS of the American Academy of Political and Social Science. Vol 668, Issue 1, p. 165 – 179

Greve, E. B. (2014) Politiets Efterretningstjeneste – en retlig belysning af tjenesten virksomhed og det samlede kontrolsystem. Jurist- og Økonomforbundet. p. 13-168

Hansen, L. (2006) Security as practice, The New International Relations Series, 1-255

Hansen, L. (2011) Theorizing the image for Security Studies: Visual securitization and the Muhammad Cartoon Crisis. European Journal of International Relations, vol. 17, no. 1, p. 51–74

Hansen, L. (2012) Reconstructing Desecuritization: The Normative-Political in the Copenhagen School and Directions for How to Apply It. Review of International Studies, vol. 38, no. 3, p. 525 –546

Hansen, L. and H. Nissenbaum (2009) Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, 53(4), p. 1155-1175

Hemmingsen, A.S and K. I. Castro (2017) The trouble with counter narratives. Danish Institute for International Studies, Report. February 2017. p. 1-48

Horgan, J. and Braddock, K. (2010). Rehabilitating the Terrorists? Challenges in Assessing

the Effectiveness of De-radicalisation Programs. Terrorism and Political Violence, 22(2),

p. 267-291

Jackson, R. (2009) Critical Terrorism Studies: An Explanation, a Defence and a Way Forward Paper prepared for the BISA Annual Conference, 14-16 December 2009, University of Leicester, UK. p. 1-25

Jackson, R., Murphy, E. and S. Poyting (2010) ‘Introduction: terrorism, the state and the study of political terror’ in Contemporary State Terrorism - Theory and Practice. Routledge. p. 1-12

Jackson, R. Smyth, M., Gunning J. and L. Jarvis (2011) ‘Conceptualizing Terrorism ’in Terrorism: A Critical Introduction, Palgrave Macmillan, p. 99-124

Jackson, R. (2015) The Epistemological Crisis of Counterterrorism. Critical Studies on Terrorism 8 (1). p. 33–54

Jungherr, A. (2014) The Logic of Political Coverage on Twitter: Temporal Dynamics and Content. Journal of Communication 64.2. p. 239-259

Klausen, J. (2015) Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq, Studies in Conflict and Terrorism 38(1), 2015, p: 1–22

Koehler, D. (2014). The Radical Online: Individual Radicalization Processes and the Role

of the Internet. Journal for Deradicalization, Winter (2014/15), p. 116-134

Lakomy, M. (2017) Cracks in the Online Caliphate: How the Islamic State is Losing Ground in the Battle for Cyberspace. Perspectives on Terrorism. Vol 11, No 3. p. 40-54

Leech, B. L and F. R. Baumgartner, J. M. Berry, M. Hojnacki and D. C. Kimball (2013) “Putting it all together. Lessons from the ‘Lobbying and Policy Change’ Project in L. Mosley, Interview Research in Political Science. Cornell University Press. New York. p. 209-225

Lindekilde, L. (2015) Danish prevention of extremism and radicalization 2009:2014: developing trends and future challenges. Politica, 47. vol. nr. 3. p. 424-444

Lorrand Bodo, M.A. and Speckhart, A. (2017) The Daily Harvester: How ISIS Disseminates Propaganda over the Internet Despite Counter-Measures and How to Fight Back. The International Center for the Study of Violent Extremism. p. 1-5

MacLean, L. M. (2013) The Power of the Interviewer in L. Mosley, Interview Research in Political Science. Cornell University Press. p. 67-84

Mavelli, L. (2013) Between Normalisation and Exception: The Securitisation of Islam and the Construction of the Secular Subject. Millennium. Journal of International Studies 41(2) p. 159–181

Maxwell, J. (2002) ‘Understanding and Validity in Qualitative Research’ in Huberman, A. M. and M. B. Miles. The Qualitative Researcher's Companion. Sage Publications. p. 36-61

Mosley, L. (2013) Introduction. “Just talk to people”? Interviews in Contemporary Political Science” in L. Mosley, Interview Research in Political Science. Cornell University Press. New York. p. 1-31

Muro, D. (2016) What does Radicalisation look like? Four visualizations of socialization into Violent Extremism. Barcelone Centre for International Affairs, p. 1-5

Nissenbaum, H. (2005) Where computer security meets national security. Ethics and Information Technology 7. Springer. p. 61–73

Radu, R. (2014) “Power Technology and Powerful Technologies: Global Governmentality and Security in the Cyberspace” in J.F. Kremer and B. Müller, Cyberspace and International Relations - Theory, Prospects and Challenges. Springer Heidelberg New York Dordrecht London. p. 3-21

Ramsay, G. (2015) Why terrorism can, but should not be defined, Critical Studies on Terrorism, 8:2. p. 211-228

Richards, A. (2015) From terrorism to ‘radicalization’ to ‘extremism’: counterterrorism imperative or loss of focus? International Affairs 91: 2. p. 371–380

Romaniuk, P. (2015) Does CVE Work? Lessons Learned From the Global Effort to Counter Violent Extremism. Global Center on Cooperative Security, September issue. p. 1-50

Rubin, H. J. and I. S. Rubin (2005) Qualitative Interviewing: The Art of Hearing Data. Second Edition. Thousand Oaks: London: Sage Publications. 19- 38; 64-78; 108-128; 129-150; 151-172; 201-223

Schofield, J.W. (2002) ‘Increasing the Generalizability of Qualitative Research’ in Huberman, A. M. and M. B. Miles. The Qualitative Researcher's Companion. Sage Publications. p. 171-202

Sheikh, J. (2016) “I Just Said It. The State”: Examining the Motivations for Danish Foreign Fighting in Syria. Perspectives on Terrorism. Vol 10, issue 6. p. 59-67

Sjöstedt, R. (2017) Securitization Theory and Foreign Policy Analysis, Politics. Oxford Research Encyclopedias, April 2017, p. 1-18

Stephens, A. C. and N. Vaughan-Williams (2010) Terrorism and the Politics of Response. Routledge. p. 1-17; 60-79

Thorup, M. (2010) An Intellectual History of Terror - War, violence and the state. Routledge. p. 1-58

Torok, R., ‘Developing an Explanatory Model for the Process of Online Radicalisation and Terrorism’, Security Informatics 2(6), 2013, p. 1–10

Urqhart, C. (2013) Grounded Theory for Qualitative Research: A Practical Guide, London. Sage Publications. p. 78-105; 106-126

Walker, C., and Conway, M. (2015) Online Terrorism and Online Laws, Dynamics of Asymmetric Conflict 8(2), p. 156–175

Williams, M.C. (2014) ‘Securitization as politica theory: The politics of the extraordinary. in Balzacq T., Guzzini S., Williams M. C., Wæver, O., and Patomäki, H. Forum: What kind of theory—if any—is securitization? P 19- 25

Wæver, O. (2014). ‘The Theory Act: Responsibility and Exactitude as seen from Securitization’. in

Interviews conducted in the spring and summer of 2017:

The Danish Foreign Ministry – April 28, 2017 (43 min)

The Danish Ministry of Justice – April 24, 2017 (48 min)

The Danish Ministry of Justice Research department – May 6, 2017 (Skype interview 24 min)

The National Centre for Prevention (NCP) – May 25, 2017 (Skype interview: 51 min)

The Ministry of Immigration and Integration – June 28, 2017 (Written interview)

The Municipality of Copenhagen – May 3, 2017 (Skype interview 28 min)

Researcher on Central Intelligence Services (CIS) – May 11, 2017 (Skype interview: 38 min)

Classified contact within the Danish Foreign Ministry – May 1, 2017 (55 min)

Websites:

Gemmerli, T. (2014) “Radicalisation: a battle between politics and science” in Udenrigs. Tema: Radikalisering. The Danish Foreign Policy Society. p. 4-15 (online). Available at:

http://udenrigs.dk/wp-content/uploads/2015/03/Udenrigs_3_2014_Web.pdf Published December 2014, Read on November 7, 2017

Gemmerli, T. (2016) Avoid the pitfalls of counter-narratives. Danish Institute for International Studies. Policy Brief. p. 1-4 (online). Available at: http://pure.diis.dk/ws/files/633658/Undg_modnarrativernes_faldgruber_til_webben.pdf Published in September 2016, Read on November 1, 2017

Gemmerli, T. and J. Teglskov Jacobsen (2014) Censorship on social media is not a good idea, Danish Institute for International Studies, Policy Impact. p. 1-2 (online). Available at: http://pure.diis.dk/ws/files/79796/Censur_er_en_d_rlig_ide_IMPACT_forweb.pdf Published in November 2014, Read on November 17, 2017

Gjerding, A. and L. Skou Andersen (2016) Denmark purchase surveillance system from NSA supplier, Information. p. 1-5 (online). Available at

https://www.information.dk/indland/2016/10/danmark-koeber-overvaagningssystem-millioner-nsa-leverandoer Published on October 28, 2016, Read on November 14, 2017

Lafree, G. (2017) 6 reasons why stopping worldwide terrorism is so challenging. The Conversation – Academic rigour, journalistic flair p. 1-5 (online). Available at

https://theconversation.com/6-reasons-why-stopping-worldwide-terrorism-is-so-challenging-70626 Published May 22, 2017, Read on November 13, 2017

Meleagrou-Hitchens, A and N. Kaderbhai (2017). Research Perspectives on Online Radicalisation: A Literature Review 2006-2016. Kings College London. p. 1-74 (online). Available at http://icsr.info/wp-content/uploads/2017/05/ResearchPerspectivesonOnlineRadicalisation.pdf Published April 30, 2017, Read on November 15, 2017

Municipality of Copenhagen (2016) Efforts by the municipality of Copenhagen to prevent radicalisation. Municipality of Copenhagen. p. 1-47 (online). Available at: https://www.kk.dk/sites/default/files/edoc/e893f1d0-8b2d-4cc2-867d- 5378ee177bd3/21df14fa-4608-4639-8b79-6aadd9e09525/Attachments/15361379- 18737342-1.PDF

Published May 2016

Read on November 2, 2017

Parliament (2017) Referatet af Folketingets forhandlinger: 1. behandling af lovforslag nr. L 171: Forslag til lov om ændring af lov om politiets virksomhed og toldloven. (Politiets anvendelse af databaserede analyseredskaber og adgang til oplysninger om flypassagerer). Meeting number 85. The first reading of the bill. p. 1-10 (online). Available at http://www.ft.dk/samling/20161/lovforslag/L171/BEH1-85/forhandling.htm#dok Published on April 25, 2017, Read on November 14, 2017

SUS – Social Development Centre (2017) Hackathons for young people (online). Available at: https://www.sus.dk/cases/hackhadet-hackathons-for-unge/

Published in September 2017, Read on November 29, 2017

Talbot, D. (2015, September 30). Fighting ISIS Online. MIT Technology Review. p. 1-10

(online). Available at: https://www.technologyreview.com/s/541801/fighting-isis-online/

Published on September 30, 2017, Read on November 10, 2017

The Danish Foreign Ministry (2016) Redegørelse af indsatsen imod terrorisme. Maj 2016.

p. 1-19 (online). Available at http://um.dk/~/media/UM/Danish-site/Documents/Udenrigspolitik/Nyheder_udenrigspolitik/2016/Redegrelse%20-%20Indsatsen%20mod%20terrorisme%202016.pdf?la=da Published on May 2016 Read on November 21, 2017

The Danish Ministry of Justice (2016) Regeringen opruster I kampen mod parallelsamfund p. 1-3 (online). Available at http://justitsministeriet.dk/nyt-og-presse/pressemeddelelser/2016/regeringen-opruster-i-kampen-mod-parallelsamfund

Published on October 11, 2016

Read on November 11, 2017

The Danish Ministry of Justice (2017) Forslag til Lov om ændring af lov om politiets virksomhed og toldloven (Politiets anvendelse af databaserede analyseredskaber og adgang til oplysninger om flypassagerer) (L171) p 1-8 (online) Available at

https://www.retsinformation.dk/forms/R0710.aspx?id=188277

Published on March 29, 2017

Read on November 8, 2017

The Danish National Action Plan (2016) Countering and Preventing Violent Extremism. p. 1-36. (online). Available at

https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/networks/radicalisation_awareness_network/docs/preventing_countering_extremism_radicalisation_en.pdf

Published on October 2016

Read on November 12, 2017

Von Behr, I., Reding, A., Edwards, C., and Gribbon, L. (2013) Radicalisation in the digital era. The use of the internet in 15 cases of terrorism and extremism. Brussels: RAND Europe. p. 1-76 (online). Available at http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR453/RAND_RR453.pdf

Published July 2013

Read on November 11, 2017

Winter, C. and J. Bach-Lombardo (2016) Why ISIS propaganda works and why stopping it requires that government get out of the way. The Atlantic. p. 1-8 (online). Available at https://www.theatlantic.com/international/archive/2016/02/isis-propagandawar/462702/

Published on February 13, 2016

Read on June 08, 2017

Downloads

Published

2018-03-21

Issue

Section

Articles